{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T14:30:57Z","timestamp":1774881057655,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,2,2]],"date-time":"2015-02-02T00:00:00Z","timestamp":1422835200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"the U.S. Army Research Office","award":["025071"],"award-info":[{"award-number":["025071"]}]},{"name":"the National Science Foundation","award":["IIS-1217466"],"award-info":[{"award-number":["IIS-1217466"]}]},{"name":"the Army Research Laboratory","award":["W911NF-09-2-0053"],"award-info":[{"award-number":["W911NF-09-2-0053"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,2,2]]},"DOI":"10.1145\/2684822.2685295","type":"proceedings-article","created":{"date-parts":[[2015,1,28]],"date-time":"2015-01-28T14:12:26Z","timestamp":1422454346000},"page":"87-96","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":97,"title":["Negative Link Prediction in Social Media"],"prefix":"10.1145","author":[{"given":"Jiliang","family":"Tang","sequence":"first","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]},{"given":"Shiyu","family":"Chang","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]},{"given":"Charu","family":"Aggarwal","sequence":"additional","affiliation":[{"name":"IBM T.J. Watson Research Center, Yorktown, NY, USA"}]},{"given":"Huan","family":"Liu","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,2,2]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"17","volume-title":"Proceedings of the Tenth International Workshop on Artificial Intelligence and Statistics (AISTAT 2005","author":"Belkin M.","year":"2005","unstructured":"M. Belkin, P. Niyogi, and V. Sindhwani. On manifold regularization. In Proceedings of the Tenth International Workshop on Artificial Intelligence and Statistics (AISTAT 2005), pages 17--24, 2005."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0046049"},{"key":"e_1_3_2_1_3_1","volume-title":"Prediction and clustering in signed networks: A local to global perspective. arXiv preprint arXiv:1302.5145","author":"Chiang K.-Y.","year":"2013","unstructured":"K.-Y. Chiang, C.-J. Hsieh, N. Natarajan, A. Tewari, and I. S. Dhillon. Prediction and clustering in signed networks: A local to global perspective. arXiv preprint arXiv:1302.5145, 2013."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063576.2063742"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/345662"},{"key":"e_1_3_2_1_6_1","article-title":"Classification in the presence of label noise: a survey","author":"Frenay B.","year":"2013","unstructured":"B. Frenay, M. Verleysen, et al. Classification in the presence of label noise: a survey. IEEE Transactions on Neural Networks and Learning Systems, pages 25--17, 2013.","journal-title":"IEEE Transactions on Neural Networks and Learning Systems, pages 25--17"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988727"},{"key":"e_1_3_2_1_8_1","first-page":"3","article-title":"Manifestations and management","volume":"8","author":"Hardin R.","year":"2004","unstructured":"R. Hardin. Distrust: Manifestations and management. Distrust, 8:3--33, 2004.","journal-title":"Distrust"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1080\/00223980.1946.9917275"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339612"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526809"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488452"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772756"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753532"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/956863.956972"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.v58:7"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835837"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1639714.1639746"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/2034117.2034146"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-011-0224-z"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-013-0141-9"},{"key":"e_1_3_2_1_22_1","first-page":"118","volume-title":"SDM","author":"Tang J.","year":"2012","unstructured":"J. Tang and H. Liu. Feature selection with linked data in social media. In SDM, pages 118--128. SIAM, 2012."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2124295.2124382"},{"key":"e_1_3_2_1_24_1","volume-title":"Web Science Conference (WebSci'09: Society On-Line), number 161","author":"Victor P.","year":"2009","unstructured":"P. Victor, C. Cornelis, M. De Cock, and A. Teredesai. Trust-and distrust-based recommendations for controversial reviews. In Web Science Conference (WebSci'09: Society On-Line), number 161, 2009."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020581"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2348283.2348359"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488517"},{"key":"e_1_3_2_1_28_1","first-page":"912","volume-title":"ICML","volume":"3","author":"Zhu X.","year":"2003","unstructured":"X. Zhu, Z. Ghahramani, J. Lafferty, et al. Semi-supervised learning using gaussian fields and harmonic functions. In ICML, volume 3, pages 912--919, 2003."}],"event":{"name":"WSDM 2015: Eighth ACM International Conference on Web Search and Data Mining","location":"Shanghai China","acronym":"WSDM 2015","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the Eighth ACM International Conference on Web Search and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2684822.2685295","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2684822.2685295","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:13:42Z","timestamp":1750227222000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2684822.2685295"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,2,2]]},"references-count":28,"alternative-id":["10.1145\/2684822.2685295","10.1145\/2684822"],"URL":"https:\/\/doi.org\/10.1145\/2684822.2685295","relation":{},"subject":[],"published":{"date-parts":[[2015,2,2]]},"assertion":[{"value":"2015-02-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}